
Seven Deadliest Web Application Attacks
PAYBACK Punkte
10 °P sammeln!
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to learn about the worst of the worst is to read the seven books in our Seven Deadliest Attacks series. The content for each of the books has been selected by our team of authors and the guys from Pauldotcom, a weekly podcast reaching 30,000 people, to make sure that we are covering the most vicious attacks out there. Not only do we let you in on the anatomy of these attacks, but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered.
This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.
Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered.
This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.